Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking Commons

Open Access. Powered by Scholars. Published by Universities.®

Networking

Theses/Dissertations

Discipline
Institution
Publication Year
Publication

Articles 1 - 19 of 19

Full-Text Articles in Digital Communications and Networking

Preserving User Data Privacy Through The Development Of An Android Solid Library, Alexandria Lim May 2023

Preserving User Data Privacy Through The Development Of An Android Solid Library, Alexandria Lim

Computer Science and Computer Engineering Undergraduate Honors Theses

In today’s world where any and all activity on the internet produces data, user data privacy and autonomy are not prioritized. Companies called data brokers are able to gather data elements of personal information numbering in the billions. This data can be anything from purchase history, credit card history, downloaded applications, and service subscriptions. This information can be analyzed and inferences can be drawn from analysis, categorizing people into groups that range in sensitivity — from hobbies to race and income classes. Not only do these data brokers constantly overlook data privacy, this mass amount of data makes them extremely …


Defense Of A Small Network, Isabella Adkins Jan 2023

Defense Of A Small Network, Isabella Adkins

Williams Honors College, Honors Research Projects

A sample network will be virtually created consisting of three routers, one switch, and three hosts. The network will be secured using various methods such as enabling passwords and encryption. After the network has been properly secured, various attacks will be attempted with the goal of breaking into the network. These attacks include reconnaissance (gathering information), penetrating the network using the tool Metasploit, and attempting to get a credential phishing email to end users. If successful in the attacks, the network will be revisited and analyzed for any weaknesses or oversights.


Leveraging Ansible To Locate Network Devices, Elijah Hadden Jan 2023

Leveraging Ansible To Locate Network Devices, Elijah Hadden

Williams Honors College, Honors Research Projects

This report demonstrates the collection of Layer 2 and Layer 3 network device information using Ansible and explains the limitations identified performing such a procedure. Maintaining dynamic documentation of network information using automation would benefit network security with improvements to attack surface visibility and cyberattack incident response time. After the procedure was conducted, it was determined that Ansible alone is incapable of producing the intended information base due to the way it handles numerical variables. This report identifies limitations in Ansible’s ability to manipulate large quantities of network information and necessitates further discussion regarding what Ansible can and should be …


Multifaceted Cybersecurity Analysis: Reconnaissance, Exploitation And Mitigation In A Controlled Network Environment, Austin Coontz Jan 2023

Multifaceted Cybersecurity Analysis: Reconnaissance, Exploitation And Mitigation In A Controlled Network Environment, Austin Coontz

Williams Honors College, Honors Research Projects

This report details a network penetration test in a simulated environment using GNS3, focusing on the configuration of routers, switches, and hosts. The project successfully identified and exploited network vulnerabilities, including FTP access, misconfigured sudo permissions, and SMB protocol weaknesses. The penetration testing process utilized tools like fping and nmap for reconnaissance and vulnerability scanning, revealing the importance of device configurations in network security. The project concluded with mitigation strategies, emphasizing the need for secure access, robust password policies, and security controls. The experience underscored the significance of continuous learning and adaptation in the ever-evolving field of cybersecurity. The project …


Machine Learning For Unmanned Aerial System (Uas) Networking, Jian Wang Dec 2021

Machine Learning For Unmanned Aerial System (Uas) Networking, Jian Wang

Doctoral Dissertations and Master's Theses

Fueled by the advancement of 5G new radio (5G NR), rapid development has occurred in many fields. Compared with the conventional approaches, beamforming and network slicing enable 5G NR to have ten times decrease in latency, connection density, and experienced throughput than 4G long term evolution (4G LTE). These advantages pave the way for the evolution of Cyber-physical Systems (CPS) on a large scale. The reduction of consumption, the advancement of control engineering, and the simplification of Unmanned Aircraft System (UAS) enable the UAS networking deployment on a large scale to become feasible. The UAS networking can finish multiple complex …


Leveraging Conventional Internet Routing Protocol Behavior To Defeat Ddos And Adverse Networking Conditions, Jared M. Smith Aug 2020

Leveraging Conventional Internet Routing Protocol Behavior To Defeat Ddos And Adverse Networking Conditions, Jared M. Smith

Doctoral Dissertations

The Internet is a cornerstone of modern society. Yet increasingly devastating attacks against the Internet threaten to undermine the Internet's success at connecting the unconnected. Of all the adversarial campaigns waged against the Internet and the organizations that rely on it, distributed denial of service, or DDoS, tops the list of the most volatile attacks. In recent years, DDoS attacks have been responsible for large swaths of the Internet blacking out, while other attacks have completely overwhelmed key Internet services and websites. Core to the Internet's functionality is the way in which traffic on the Internet gets from one destination …


Creature Care, Alexander Weber Jan 2020

Creature Care, Alexander Weber

Williams Honors College, Honors Research Projects

Caring for a pet is a formidable responsibility that requires intense care and monitoring in order to protect and prolong the life of the animal. Traditionally, caring for a reptile presents a unique challenge for pet owners, who not only need to care for the animal but for the environment as well. Individual species distinctly require precise monitoring and control of environmental parameters such as temperature, humidity, and air quality; and deviation from the nominal values often leads to serious health problems for the reptile. To simplify reptile ownership, a system was designed that measures the critical parameters of a …


Dynamic Routing And Network Monitoring For The Polywog Protocol, Ryan Lawrence, Josh Pfeffer Jun 2018

Dynamic Routing And Network Monitoring For The Polywog Protocol, Ryan Lawrence, Josh Pfeffer

Computer Science and Software Engineering

This document analyzes the implementation of dynamic routing for router nodes in a mesh network. It examines the algorithm used to populate both the minimum-distance and the routing tables. Furthermore, it describes the node configurations used for testing and applications for mesh networks.

Additionally, this document describes the implementation and testing of network monitoring in a mesh network. It discusses the steps used to forward active nodes in the network between router nodes, a gateway node, and a network monitor.

Lastly, this paper details our future plans for implementing additional features for a network monitor.


Improving Hpc Communication Library Performance On Modern Architectures, Matthew G. F. Dosanjh Oct 2017

Improving Hpc Communication Library Performance On Modern Architectures, Matthew G. F. Dosanjh

Computer Science ETDs

As high-performance computing (HPC) systems advance towards exascale (10^18 operations per second), they must leverage increasing levels of parallelism to achieve their performance goals. In addition to increased parallelism, machines of that scale will have strict power limitations placed on them. One direction currently being explored to alleviate those issues are many-core processors such as Intel’s Xeon Phi line. Many-core processors sacrifice clock speed and core complexity, such as out of order pipelining, to increase the number of cores on a die. While this increases floating point throughput, it can reduce the performance of serialized, synchronized, and latency sensitive code …


Musictrakr, Benjamin Lin Jun 2016

Musictrakr, Benjamin Lin

Computer Engineering

MusicTrackr is an IoT device that musicians attach to their instruments. The device has a start and stop button that allows users to record their playing sessions. Each recorded session is sent wirelessly to a cloud database. An accompanying website displays all of the recorded sessions, organized by date. After picking a specific date, the user can view graphs showing total practice time and average session length as well play back any recordings during that date. In addition, the user may add comments to any specific date or recording. Lastly, the user may tag a specific date with a color …


Ipv6 And Ospf Networks Lab, Kevin Jeremy Watson Jun 2016

Ipv6 And Ospf Networks Lab, Kevin Jeremy Watson

Computer Engineering

No abstract provided.


Home Networking With Enterprise Equipment, Alex Lowers Jan 2016

Home Networking With Enterprise Equipment, Alex Lowers

Williams Honors College, Honors Research Projects

This project tested various wired and wireless topologies and benchmarked download speeds and quality for various types of media. For music, topology had a negligible impact. High quality video streams were impacted by latency introduced in the wireless topologies. Likewise, video game streaming, especially games of high graphical fidelity, were negatively impacted when streamed over a wireless network. For all types of media, a fully wired topology is recommended.


Implementing Is-Is Routing And Dhcp Services In An Ipv4 Network, Laura Thompson Jan 2015

Implementing Is-Is Routing And Dhcp Services In An Ipv4 Network, Laura Thompson

Williams Honors College, Honors Research Projects

This research project explores the operation of the IS-IS routing protocol, as well as DHCP and DNS services provided by a Raspberry Pi computer. IS-IS is a routing protocol that is commonly ignored in most training and certification programs, because it is most frequently used by service providers. However, IS-IS solutions are also deployed in some large enterprise networks, making experience with the protocol a valuable skill.

In order to gain a deeper understanding of the routing domains, route propagation, and general operation of IS-IS, additional services were implemented in this project. A Raspberry Pi computer was used as an …


Conception, Design And Construction Of A Remote Wifi Vehicle Using Arduino, Clayton Broman Mar 2014

Conception, Design And Construction Of A Remote Wifi Vehicle Using Arduino, Clayton Broman

Physics

The scope of this senior project was to make a wireless vehicle controlled via Internet Protocol. This vehicle operates remotely and without direct line of sight. Commands are sent from a program running on a laptop and transmitted using a wireless router. Visual data is retrieved from a network camera, mounted on the vehicle, in real-time, to see where you are going.


Lyfi, Kianoosh Salami, Justin Cotton, Elush Shirazpour Jun 2012

Lyfi, Kianoosh Salami, Justin Cotton, Elush Shirazpour

Electrical Engineering

This paper will cover the steps necessary to design, build, and manage networkable smart light switches over WiFi via a mobile application. It contains a microcontroller running a real time operating system, a WiFi module, a Java server with SQLite databasing, and a mobile phone application.

LyFi is designed to turn on/off and dim household lights while only requiring the same installation procedure as a less capable dimmer switch. Once installed and connected to a network, LyFi will self-discover and configure. The server automatically propogates a database of nodes where any mobile device running an application can receive an updated …


Sports-Tool, Bryant Ung Dec 2010

Sports-Tool, Bryant Ung

Computer Science and Software Engineering

Creating events and finding people to play sports is a hard thing to do. The solution to this problem is to provide a web based interactive site that allows people to create and join different type of events and interact with each other by creating teams.


Design And Usability Of Social Networking Web Sites, Robert Pessagno Jun 2010

Design And Usability Of Social Networking Web Sites, Robert Pessagno

Graphic Communication

This study began by designing the layout of a new social networking Web site and putting it to practical use. A team of computer science students at Cal Poly developed this social networking site for their senior project, and called it Friend Riot. The new and innovative features that Friend Riot consists of set it apart from other popular social networking Web sites, but its interface was lacking a good design. When the new design was implemented, it was tested against the competition: Facebook, MySpace, and YouTube.

The purpose of this study is to determine the effects that Web design …


General Direction Routing Protocol, Sean Michael Lydon Jun 2009

General Direction Routing Protocol, Sean Michael Lydon

Master's Theses

The General Direction Routing Protocol (GDRP) is a Wireless Sensor Network (WSN)

multi-path routing protocol which abstracts localization information (commonly GPS

coordinates) into relative direction information in order to perform routing decisions. By

generating relative direction information GDRP is able to operate with fewer precision

requirements than other protocols. This abstraction also allows the integration of other emerging

hardware-based localization techniques, for example, Beamforming Sensor Arrays.

GDRP does not specifically address the next hop a packet should take, but instead specifies a

direction it should travel. This direction abstraction allows for multiple paths to be taken through

the network thus …


Hierarchical Routing In Manets Using Simple Clustering, Adam Carnine Jan 2009

Hierarchical Routing In Manets Using Simple Clustering, Adam Carnine

UNLV Theses, Dissertations, Professional Papers, and Capstones

This thesis presents both a review of current MANET routing protocols and a new MANET routing algorithm. The routing protocols reviewed include representative samples from the three primary forms of routing found in MANETS: proactive routing, reactive routing and hybrid routing. Secure algorithms are given special treatment in the review. In addition several protocol enhancements are discussed.

The proposed routing protocol is designed to support networks of a medium size, containing over 200 nodes but less than 3,000 nodes. The design is intentionally simple to allow ease of implementation in comparison with other MANET protocols that provide similar functionality.